Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
141s -
max time network
135s -
platform
windows7_x64 -
resource
win7-20230831-en -
resource tags
arch:x64arch:x86image:win7-20230831-enlocale:en-usos:windows7-x64system -
submitted
12/10/2023, 16:33
Static task
static1
Behavioral task
behavioral1
Sample
NEAS.2fc5e7d3dacc43e663d4457cdf55b046_JC.exe
Resource
win7-20230831-en
Behavioral task
behavioral2
Sample
NEAS.2fc5e7d3dacc43e663d4457cdf55b046_JC.exe
Resource
win10v2004-20230915-en
General
-
Target
NEAS.2fc5e7d3dacc43e663d4457cdf55b046_JC.exe
-
Size
363KB
-
MD5
2fc5e7d3dacc43e663d4457cdf55b046
-
SHA1
e00e081cb608ff2ff88beb357c13faa8cfb3262a
-
SHA256
b58f0d16511cdf3a235f610f196a9dc41381468bf01d625e7821a0dbb5e7c510
-
SHA512
071ba12874c92f7310f47249e000587f19947781a69818708e936858670819c5995edb543d5172128cdd690792fa6f801aac7c3e541ed404447220331d07b128
-
SSDEEP
6144:ej2xExsY5tTDUZNSN58VU5tT+JG2K565tTDUZNSN58VU5tT:bK5t6NSN6G5t6Gds5t6NSN6G5t
Malware Config
Signatures
-
Adds autorun key to be loaded by Explorer.exe on startup 2 TTPs 8 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Bnielm32.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Blobjaba.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Blobjaba.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Bfkpqn32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Bfkpqn32.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad NEAS.2fc5e7d3dacc43e663d4457cdf55b046_JC.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" NEAS.2fc5e7d3dacc43e663d4457cdf55b046_JC.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Bnielm32.exe -
Executes dropped EXE 4 IoCs
pid Process 1836 Bnielm32.exe 2132 Blobjaba.exe 2648 Bfkpqn32.exe 2612 Cacacg32.exe -
Loads dropped DLL 12 IoCs
pid Process 1492 NEAS.2fc5e7d3dacc43e663d4457cdf55b046_JC.exe 1492 NEAS.2fc5e7d3dacc43e663d4457cdf55b046_JC.exe 1836 Bnielm32.exe 1836 Bnielm32.exe 2132 Blobjaba.exe 2132 Blobjaba.exe 2648 Bfkpqn32.exe 2648 Bfkpqn32.exe 2516 WerFault.exe 2516 WerFault.exe 2516 WerFault.exe 2516 WerFault.exe -
Drops file in System32 directory 12 IoCs
description ioc Process File created C:\Windows\SysWOW64\Bnielm32.exe NEAS.2fc5e7d3dacc43e663d4457cdf55b046_JC.exe File created C:\Windows\SysWOW64\Bfkpqn32.exe Blobjaba.exe File created C:\Windows\SysWOW64\Cacacg32.exe Bfkpqn32.exe File created C:\Windows\SysWOW64\Ihmnkh32.dll Bnielm32.exe File opened for modification C:\Windows\SysWOW64\Bfkpqn32.exe Blobjaba.exe File created C:\Windows\SysWOW64\Pkfaka32.dll Blobjaba.exe File opened for modification C:\Windows\SysWOW64\Cacacg32.exe Bfkpqn32.exe File opened for modification C:\Windows\SysWOW64\Bnielm32.exe NEAS.2fc5e7d3dacc43e663d4457cdf55b046_JC.exe File created C:\Windows\SysWOW64\Ennlme32.dll NEAS.2fc5e7d3dacc43e663d4457cdf55b046_JC.exe File created C:\Windows\SysWOW64\Blobjaba.exe Bnielm32.exe File opened for modification C:\Windows\SysWOW64\Blobjaba.exe Bnielm32.exe File created C:\Windows\SysWOW64\Fdlpjk32.dll Bfkpqn32.exe -
Program crash 1 IoCs
pid pid_target Process 2516 2612 WerFault.exe -
Modifies registry class 15 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 NEAS.2fc5e7d3dacc43e663d4457cdf55b046_JC.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Bnielm32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Bfkpqn32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node NEAS.2fc5e7d3dacc43e663d4457cdf55b046_JC.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" NEAS.2fc5e7d3dacc43e663d4457cdf55b046_JC.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Fdlpjk32.dll" Bfkpqn32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Bfkpqn32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738} NEAS.2fc5e7d3dacc43e663d4457cdf55b046_JC.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Blobjaba.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Blobjaba.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID NEAS.2fc5e7d3dacc43e663d4457cdf55b046_JC.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Ennlme32.dll" NEAS.2fc5e7d3dacc43e663d4457cdf55b046_JC.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Ihmnkh32.dll" Bnielm32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Bnielm32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Pkfaka32.dll" Blobjaba.exe -
Suspicious use of WriteProcessMemory 20 IoCs
description pid Process procid_target PID 1492 wrote to memory of 1836 1492 NEAS.2fc5e7d3dacc43e663d4457cdf55b046_JC.exe 28 PID 1492 wrote to memory of 1836 1492 NEAS.2fc5e7d3dacc43e663d4457cdf55b046_JC.exe 28 PID 1492 wrote to memory of 1836 1492 NEAS.2fc5e7d3dacc43e663d4457cdf55b046_JC.exe 28 PID 1492 wrote to memory of 1836 1492 NEAS.2fc5e7d3dacc43e663d4457cdf55b046_JC.exe 28 PID 1836 wrote to memory of 2132 1836 Bnielm32.exe 29 PID 1836 wrote to memory of 2132 1836 Bnielm32.exe 29 PID 1836 wrote to memory of 2132 1836 Bnielm32.exe 29 PID 1836 wrote to memory of 2132 1836 Bnielm32.exe 29 PID 2132 wrote to memory of 2648 2132 Blobjaba.exe 30 PID 2132 wrote to memory of 2648 2132 Blobjaba.exe 30 PID 2132 wrote to memory of 2648 2132 Blobjaba.exe 30 PID 2132 wrote to memory of 2648 2132 Blobjaba.exe 30 PID 2648 wrote to memory of 2612 2648 Bfkpqn32.exe 32 PID 2648 wrote to memory of 2612 2648 Bfkpqn32.exe 32 PID 2648 wrote to memory of 2612 2648 Bfkpqn32.exe 32 PID 2648 wrote to memory of 2612 2648 Bfkpqn32.exe 32 PID 2612 wrote to memory of 2516 2612 Cacacg32.exe 31 PID 2612 wrote to memory of 2516 2612 Cacacg32.exe 31 PID 2612 wrote to memory of 2516 2612 Cacacg32.exe 31 PID 2612 wrote to memory of 2516 2612 Cacacg32.exe 31
Processes
-
C:\Users\Admin\AppData\Local\Temp\NEAS.2fc5e7d3dacc43e663d4457cdf55b046_JC.exe"C:\Users\Admin\AppData\Local\Temp\NEAS.2fc5e7d3dacc43e663d4457cdf55b046_JC.exe"1⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Loads dropped DLL
- Drops file in System32 directory
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:1492 -
C:\Windows\SysWOW64\Bnielm32.exeC:\Windows\system32\Bnielm32.exe2⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:1836 -
C:\Windows\SysWOW64\Blobjaba.exeC:\Windows\system32\Blobjaba.exe3⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:2132 -
C:\Windows\SysWOW64\Bfkpqn32.exeC:\Windows\system32\Bfkpqn32.exe4⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:2648 -
C:\Windows\SysWOW64\Cacacg32.exeC:\Windows\system32\Cacacg32.exe5⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2612
-
-
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2612 -s 1401⤵
- Loads dropped DLL
- Program crash
PID:2516
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
363KB
MD5dece9d7ef2e970818364f2fce07d4626
SHA1f46a95d667523d5d863e0a59fccde7e622a3f2ba
SHA256b99e450978acc3f907e388cfe56dbfaa340ed22fadfe022590bbd201187bffc0
SHA512244d5f2652288c5f67d22ef8829cddbeb0d94bd94ca2ccdaaba893fda9b430e2729b17691f02f2ff6093cc4f9f34f3efbc006032502b08bdd2d6921e9daaa581
-
Filesize
363KB
MD5dece9d7ef2e970818364f2fce07d4626
SHA1f46a95d667523d5d863e0a59fccde7e622a3f2ba
SHA256b99e450978acc3f907e388cfe56dbfaa340ed22fadfe022590bbd201187bffc0
SHA512244d5f2652288c5f67d22ef8829cddbeb0d94bd94ca2ccdaaba893fda9b430e2729b17691f02f2ff6093cc4f9f34f3efbc006032502b08bdd2d6921e9daaa581
-
Filesize
363KB
MD5dece9d7ef2e970818364f2fce07d4626
SHA1f46a95d667523d5d863e0a59fccde7e622a3f2ba
SHA256b99e450978acc3f907e388cfe56dbfaa340ed22fadfe022590bbd201187bffc0
SHA512244d5f2652288c5f67d22ef8829cddbeb0d94bd94ca2ccdaaba893fda9b430e2729b17691f02f2ff6093cc4f9f34f3efbc006032502b08bdd2d6921e9daaa581
-
Filesize
363KB
MD5749d92e251d353a9a6209d43cc721aa5
SHA1021a4dab9a7fff576a5a11f428188f3185fe9d0e
SHA2562ba843c5e124f8a3955b0d7f96ea302a21dada7a6ea71e04fda5535a83f153da
SHA512d13059d6780cf2cf4fec070f13082271fd5c191ff8d3e2908395e476a616ffaea407093b46494b4405003e62f6bc7ece20d1e45d3e237bccc80d72237016b475
-
Filesize
363KB
MD5749d92e251d353a9a6209d43cc721aa5
SHA1021a4dab9a7fff576a5a11f428188f3185fe9d0e
SHA2562ba843c5e124f8a3955b0d7f96ea302a21dada7a6ea71e04fda5535a83f153da
SHA512d13059d6780cf2cf4fec070f13082271fd5c191ff8d3e2908395e476a616ffaea407093b46494b4405003e62f6bc7ece20d1e45d3e237bccc80d72237016b475
-
Filesize
363KB
MD5749d92e251d353a9a6209d43cc721aa5
SHA1021a4dab9a7fff576a5a11f428188f3185fe9d0e
SHA2562ba843c5e124f8a3955b0d7f96ea302a21dada7a6ea71e04fda5535a83f153da
SHA512d13059d6780cf2cf4fec070f13082271fd5c191ff8d3e2908395e476a616ffaea407093b46494b4405003e62f6bc7ece20d1e45d3e237bccc80d72237016b475
-
Filesize
363KB
MD5c28abff31db36f187d7721a80ea940ca
SHA19ede610923c4ea6e9df0d71bb88b5bb7b3dfea15
SHA256576dc2dcd0f0018e7e1a6e956139a349b916bb19664d89a44510fc4c90e862a9
SHA5129074547114500c5d0db763ce0c046e509a63ccc7e503d37ad6a45df6caffd0b4b831bb1a7ba0f546f5920506f19f91fe6318c375082efa2c3ebbae77d65d3a82
-
Filesize
363KB
MD5c28abff31db36f187d7721a80ea940ca
SHA19ede610923c4ea6e9df0d71bb88b5bb7b3dfea15
SHA256576dc2dcd0f0018e7e1a6e956139a349b916bb19664d89a44510fc4c90e862a9
SHA5129074547114500c5d0db763ce0c046e509a63ccc7e503d37ad6a45df6caffd0b4b831bb1a7ba0f546f5920506f19f91fe6318c375082efa2c3ebbae77d65d3a82
-
Filesize
363KB
MD5c28abff31db36f187d7721a80ea940ca
SHA19ede610923c4ea6e9df0d71bb88b5bb7b3dfea15
SHA256576dc2dcd0f0018e7e1a6e956139a349b916bb19664d89a44510fc4c90e862a9
SHA5129074547114500c5d0db763ce0c046e509a63ccc7e503d37ad6a45df6caffd0b4b831bb1a7ba0f546f5920506f19f91fe6318c375082efa2c3ebbae77d65d3a82
-
Filesize
363KB
MD5dc49999288bf121f80a004a0c8891f65
SHA14906c528a9af5395cba9a81d317f70c25e82945f
SHA25637d0fb9e62211a43f64608b30360635b7d1be3c71fe2c0939a7859c88ec22a7e
SHA512a4a05588d529f4a1534a64651e32650202463146aa52f2f9662dd1aac994183f5a22ee248d5521ae7c63296a541727331ada040f242d3512bd80ddeb8ccc5b2a
-
Filesize
363KB
MD5dc49999288bf121f80a004a0c8891f65
SHA14906c528a9af5395cba9a81d317f70c25e82945f
SHA25637d0fb9e62211a43f64608b30360635b7d1be3c71fe2c0939a7859c88ec22a7e
SHA512a4a05588d529f4a1534a64651e32650202463146aa52f2f9662dd1aac994183f5a22ee248d5521ae7c63296a541727331ada040f242d3512bd80ddeb8ccc5b2a
-
Filesize
363KB
MD5dece9d7ef2e970818364f2fce07d4626
SHA1f46a95d667523d5d863e0a59fccde7e622a3f2ba
SHA256b99e450978acc3f907e388cfe56dbfaa340ed22fadfe022590bbd201187bffc0
SHA512244d5f2652288c5f67d22ef8829cddbeb0d94bd94ca2ccdaaba893fda9b430e2729b17691f02f2ff6093cc4f9f34f3efbc006032502b08bdd2d6921e9daaa581
-
Filesize
363KB
MD5dece9d7ef2e970818364f2fce07d4626
SHA1f46a95d667523d5d863e0a59fccde7e622a3f2ba
SHA256b99e450978acc3f907e388cfe56dbfaa340ed22fadfe022590bbd201187bffc0
SHA512244d5f2652288c5f67d22ef8829cddbeb0d94bd94ca2ccdaaba893fda9b430e2729b17691f02f2ff6093cc4f9f34f3efbc006032502b08bdd2d6921e9daaa581
-
Filesize
363KB
MD5749d92e251d353a9a6209d43cc721aa5
SHA1021a4dab9a7fff576a5a11f428188f3185fe9d0e
SHA2562ba843c5e124f8a3955b0d7f96ea302a21dada7a6ea71e04fda5535a83f153da
SHA512d13059d6780cf2cf4fec070f13082271fd5c191ff8d3e2908395e476a616ffaea407093b46494b4405003e62f6bc7ece20d1e45d3e237bccc80d72237016b475
-
Filesize
363KB
MD5749d92e251d353a9a6209d43cc721aa5
SHA1021a4dab9a7fff576a5a11f428188f3185fe9d0e
SHA2562ba843c5e124f8a3955b0d7f96ea302a21dada7a6ea71e04fda5535a83f153da
SHA512d13059d6780cf2cf4fec070f13082271fd5c191ff8d3e2908395e476a616ffaea407093b46494b4405003e62f6bc7ece20d1e45d3e237bccc80d72237016b475
-
Filesize
363KB
MD5c28abff31db36f187d7721a80ea940ca
SHA19ede610923c4ea6e9df0d71bb88b5bb7b3dfea15
SHA256576dc2dcd0f0018e7e1a6e956139a349b916bb19664d89a44510fc4c90e862a9
SHA5129074547114500c5d0db763ce0c046e509a63ccc7e503d37ad6a45df6caffd0b4b831bb1a7ba0f546f5920506f19f91fe6318c375082efa2c3ebbae77d65d3a82
-
Filesize
363KB
MD5c28abff31db36f187d7721a80ea940ca
SHA19ede610923c4ea6e9df0d71bb88b5bb7b3dfea15
SHA256576dc2dcd0f0018e7e1a6e956139a349b916bb19664d89a44510fc4c90e862a9
SHA5129074547114500c5d0db763ce0c046e509a63ccc7e503d37ad6a45df6caffd0b4b831bb1a7ba0f546f5920506f19f91fe6318c375082efa2c3ebbae77d65d3a82
-
Filesize
363KB
MD5dc49999288bf121f80a004a0c8891f65
SHA14906c528a9af5395cba9a81d317f70c25e82945f
SHA25637d0fb9e62211a43f64608b30360635b7d1be3c71fe2c0939a7859c88ec22a7e
SHA512a4a05588d529f4a1534a64651e32650202463146aa52f2f9662dd1aac994183f5a22ee248d5521ae7c63296a541727331ada040f242d3512bd80ddeb8ccc5b2a
-
Filesize
363KB
MD5dc49999288bf121f80a004a0c8891f65
SHA14906c528a9af5395cba9a81d317f70c25e82945f
SHA25637d0fb9e62211a43f64608b30360635b7d1be3c71fe2c0939a7859c88ec22a7e
SHA512a4a05588d529f4a1534a64651e32650202463146aa52f2f9662dd1aac994183f5a22ee248d5521ae7c63296a541727331ada040f242d3512bd80ddeb8ccc5b2a
-
Filesize
363KB
MD5dc49999288bf121f80a004a0c8891f65
SHA14906c528a9af5395cba9a81d317f70c25e82945f
SHA25637d0fb9e62211a43f64608b30360635b7d1be3c71fe2c0939a7859c88ec22a7e
SHA512a4a05588d529f4a1534a64651e32650202463146aa52f2f9662dd1aac994183f5a22ee248d5521ae7c63296a541727331ada040f242d3512bd80ddeb8ccc5b2a
-
Filesize
363KB
MD5dc49999288bf121f80a004a0c8891f65
SHA14906c528a9af5395cba9a81d317f70c25e82945f
SHA25637d0fb9e62211a43f64608b30360635b7d1be3c71fe2c0939a7859c88ec22a7e
SHA512a4a05588d529f4a1534a64651e32650202463146aa52f2f9662dd1aac994183f5a22ee248d5521ae7c63296a541727331ada040f242d3512bd80ddeb8ccc5b2a
-
Filesize
363KB
MD5dc49999288bf121f80a004a0c8891f65
SHA14906c528a9af5395cba9a81d317f70c25e82945f
SHA25637d0fb9e62211a43f64608b30360635b7d1be3c71fe2c0939a7859c88ec22a7e
SHA512a4a05588d529f4a1534a64651e32650202463146aa52f2f9662dd1aac994183f5a22ee248d5521ae7c63296a541727331ada040f242d3512bd80ddeb8ccc5b2a
-
Filesize
363KB
MD5dc49999288bf121f80a004a0c8891f65
SHA14906c528a9af5395cba9a81d317f70c25e82945f
SHA25637d0fb9e62211a43f64608b30360635b7d1be3c71fe2c0939a7859c88ec22a7e
SHA512a4a05588d529f4a1534a64651e32650202463146aa52f2f9662dd1aac994183f5a22ee248d5521ae7c63296a541727331ada040f242d3512bd80ddeb8ccc5b2a